Review and evaluation of new data security models in cloud computing


  1. F. Borivoje and A. Escalante, “Handbook of cloud computing,” vol. 3, New York: Springer, 2010.
  2. M. Peter and T. Grance, “The NIST definition of cloud computing,” National Institute of Standards and Technology, Gaithersburg, 2011.
  3. M. Dan, “Cloud computing: Theory and practice,” AMSTERDAM: Morgan Kaufmann, 2012.
  4. F. Gen, “IT Cloud Services User Survey, pt.2: Top Benefits & Challenges,” 2011.
  5. [Online].Available:http://blogs.idc.com/ie/?p=210.
  6. R. R. Velumadhava and K. Selvamani, “Data Security Challenges and Its Solutions in Cloud Computing,” International Conference on Computer, Communication and Convergence(ICCCN), pp. 204-209, 2015.
  7. T. San and X. Wang, “Research of Data Security Model in Cloud Computing Platform for Smes,” International Journal of Security and Its Applications(IJSIA), vol. 7, no. 6, pp. 97-108, 2013.
  8. L. Geng, D. Fu, J. Zho, and G. Dasmalchi, “Cloud computing: IT as a service,” IT professional Journal(IPJ), vol. 11, no. 2, pp. 10-13, 1 Mar 2009.
  9. V. Chandu and P. Khobragade, “Data Security in Cloud Computing,” International Journal on Recent and Innovation Trends in Computing and Communication(IJRITCC), vol. 3, no. 5, pp. 167–170, 2015.
  10. Z. Priscakova and I. Rabova, “Model of solutions for data security in Cloud Computing,” International Journal of Computer Science, Engineering and Information Technology(IJCSEIT), vol. 3, no. 1, pp. 11-23, 2013.
  11. N. Mazher and I. Ashraf, “A Survey on data security models in cloud computing,” International Journal of Engineering Research and Applications(IJERA), vol. 3, no. 6, pp. 413-417, 2013.
  12. S. Ramasami and P. Umamaheswari, “Survey on Data Security Issues and Data Security Models in Cloud Computing,” International Journal of Engineering and Innovative Technology (IJEIT), vol. 1, no. 3, pp. 56-60, 2012
  13. S. Sood, “A combined approach to ensure data ecurity in cloud computing,” journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831–1838, 2012.
  14. M. Sharma, “Level-Based Data Security Model in Cloud Computing,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 4, no. 2, pp. 68-71, 2014.
  15. Y. Reddemma, L. Thirupathi, and S. Gunti, “Secure Model for Cloud Computing Based Storage and Retrieval,” IOSR Journal of Computer Engineering (IOSRJCE), vol. 6, no. 1, pp. 1-5, 2012.